scispace - formally typeset
Search or ask a question

Showing papers in "Ksii Transactions on Internet and Information Systems in 2017"


Journal Article
TL;DR: In this paper, a load balancing algorithm based on honey bee behavior (LBA_HB) is proposed to distribute workload of multiple network links in the way that avoid underutilization and over utilization of the resources.
Abstract: The technology of cloud computing is growing very quickly, thus it is required to manage the process of resource allocation. In this paper, load balancing algorithm based on honey bee behavior (LBA_HB) is proposed. Its main goal is distribute workload of multiple network links in the way that avoid underutilization and over utilization of the resources. This can be achieved by allocating the incoming task to a virtual machine (VM) which meets two conditions; number of tasks currently processing by this VM is less than number of tasks currently processing by other VMs and the deviation of this VM processing time from average processing time of all VMs is less than a threshold value. The proposed algorithm is compared with different scheduling algorithms; honey bee, ant colony, modified throttled and round robin algorithms. The results of experiments show the efficiency of the proposed algorithm in terms of execution time, response time, makespan, standard deviation of load, and degree of imbalance.

54 citations





Journal Article
TL;DR: In this paper, two methods are proposed to resolve these issues, which reflect the difference of the number of positive words and negative words in calculating the weights, and eliminate insignificant words in the feature selection step using Multinomial Naive Bayes(MNB) algorithm.
Abstract: With rapid growth of web technology and dissemination of smart devices, social networking service(SNS) is widely used. As a result, huge amount of data are generated from SNS such as Twitter, and sentiment analysis of SNS data is very important for various applications and services. In the existing sentiment analysis based on the Naive Bayes algorithm, a same number of attributes is usually employed to estimate the weight of each class. Moreover, uncountable and meaningless attributes are included. This results in decreased accuracy of sentiment analysis. In this paper two methods are proposed to resolve these issues, which reflect the difference of the number of positive words and negative words in calculating the weights, and eliminate insignificant words in the feature selection step using Multinomial Naive Bayes(MNB) algorithm. Performance comparison demonstrates that the proposed scheme significantly increases the accuracy compared to the existing Multivariate Bernoulli Naive Bayes(BNB) algorithm and MNB scheme.

32 citations


Journal ArticleDOI
TL;DR: The descriptions of a variety of the new AR explorations are presented, and the issues that are relevant to the contemporary development of the fundamental technologies and applications are discussed.
Abstract: The recent advances in the field of augmented reality (AR) have shown that the technology is a fundamental part of modern immersive interactive systems for the achievement of user engagement and a dynamic user experience. This survey paper presents the descriptions of a variety of the new AR explorations, and the issues that are relevant to the contemporary development of the fundamental technologies and applications are discussed. Most of the literature regarding the pertinent topics-taxonomy, the core tracking and sensing technologies, the hardware and software platforms, and the domain-specific applications-are then chronologically surveyed, and in varying detail, this is supplemented with the cited papers. This paper portrays the diversity of the research regarding the AR field together with an overview of the benefits and the limitations of the competing and complementary technologies.

30 citations



Journal ArticleDOI
TL;DR: In this article, an enhanced AR (EAR) system is proposed to display useful statistical players' information on captured images of a sports game, where the input image is degraded by strong sunlight.
Abstract: Augmented Reality (AR) overlays virtual information on real world data, such as displaying useful information on videos/images of a scene. This paper presents an Enhanced AR (EAR) system that displays useful statistical players’ information on captured images of a sports game. We focus on the situation where the input image is degraded by strong sunlight. Proposed EAR system consists of an image enhancement technique to improve the accuracy of subsequent player and face detection. The image enhancement is followed by player and face detection, face recognition, and players’ statistics display. First, an algorithm based on multi-scale retinex is proposed for image enhancement. Then, to detect players’ and faces’, we use adaptive boosting and Haar features for feature extraction and classification. The player face recognition algorithm uses boosted linear discriminant analysis to select features and nearest neighbor classifier for classification. The system can be adjusted to work in different types of sports where the input is an image and the desired output is display of information nearby the recognized players. Simulations are carried out on 2096 different images that contain players in diverse conditions. Proposed EAR system demonstrates the great potential of computer vision based approaches to develop AR applications.

30 citations


Journal Article
TL;DR: A method is proposed that directly extracts dynamic texture features based on irregular motion regions to reduce adverse impacts of block size and motion area ratio threshold and the results show that dynamic texture is a reliable clue for video based smoke detection.
Abstract: In this paper, a video based smoke detection method using dynamic texture feature extraction with volume local binary patterns is studied. Block based method was used to distinguish smoke frames in high definition videos obtained by experiments firstly. Then we propose a method that directly extracts dynamic texture features based on irregular motion regions to reduce adverse impacts of block size and motion area ratio threshold. Several general volume local binary patterns were used to extract dynamic texture, including LBPTOP, VLBP, CLBPTOP and CVLBP, to study the effect of the number of sample points, frame interval and modes of the operator on smoke detection. Support vector machine was used as the classifier for dynamic texture features. The results show that dynamic texture is a reliable clue for video based smoke detection. It is generally conducive to reducing the false alarm rate by increasing the dimension of the feature vector. However, it does not always contribute to the improvement of the detection rate. Additionally, it is found that the feature computing time is not directly related to the vector dimension in our experiments, which is important for the realization of real-time detection.

28 citations




Journal Article
TL;DR: Wang et al. as mentioned in this paper proposed an enhanced and provably secure authentication scheme for distributed MCC services, which can meet all desirable security requirements and is able to resist against various kinds of attacks.
Abstract: With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.’s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Journal Article
TL;DR: In terms of the effect of personality on SNS addiction, this study found that consciousness was negatively associated with Facebook addiction, while extraversion and neuroticism were positively associated withFacebook addiction.
Abstract: Many empirical studies indicate that SNS use has increased substantially over the last few years People use SNSs for social purposes, mostly related to the maintenance of existing offline contacts Such usage may have led to compulsive use of SNSs resulting in addictive behavior This paper aims to explore factors affecting SNS addiction Specifically, the study examined the role of personality traits in the Facebook usage among college students Compared to the rest of world, daily log on the site has grown very quickly in South Korea And college students constitute a vast majority of Facebook users in South Korea Results from a survey of 235 college students revealed that extraversion and neuroticism positively predicted Facebook usage Students who were high in extraversion were more likely to update their profiles, share photo and images with others and give feedback on other’s posts Similarly, those who were high in neuroticism were more likely to share photo and images with others and update their profiles These findings support previous research Furthermore, in terms of the effect of personality on SNS addiction, this study found that consciousness was negatively associated with Facebook addiction, while extraversion and neuroticism were positively associated with Facebook addiction Based on these findings implications and directions for futures studies are discussed


Journal Article
TL;DR: This work proposes an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs that does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes.
Abstract: Interference-aware routing protocol design for underwater wireless sensor networks (UWSNs) is one of the key strategies in reducing packet loss in the highly hostile underwater environment. The reduced interference causes efficient utilization of the limited battery power of the sensor nodes that, in consequence, prolongs the entire network lifetime. In this paper, we propose an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs. A sender node selects the best relay node in its neighborhood with the lowest depth and the least number of neighbors. Combination of the two routing metrics ensures that data packets are forwarded along the least interference paths to reach the final destination. The proposed work is unique in that it does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes. Simulation results reveal better performance of the scheme than the counterparts DBR and EEDBR techniques in terms of energy efficiency, packet delivery ratio and end-to-end delay.


Journal Article
TL;DR: This paper calculates the DCT coefficients firstly, and then they are compared with the JND thresholds, and the experimental results of the proposed method are superior.
Abstract: In this paper, a novel multiple description image coding (MDC) scheme is proposed, which is based on the characteristics of the human visual model. Due to the inherent characteristics of human vision, the human eye can only perceive the change of the specific thresholds, that is, the just noticeable difference (JND) thresholds. Therefore, JND model is applied to improve MDC syetem. This paper calculates the DCT coefficients firstly, and then they are compared with the JND thresholds. The data that is less than the JND thresholds can be neglected, which will improve the coding efficiency. Compared with other existing methods, the experimental results of the proposed method are superior.

Journal Article
TL;DR: In this article, a Modified Particle Swarm Optimization (MPSO) algorithm is proposed to solve the problem of efficient scheduling of cloud computing resources, which minimizes task execution time and maximizes the resource utilization rate.
Abstract: Cloud computing system consists of distributed resources in a dynamic and decentralized environment. Therefore, using cloud computing resources efficiently and getting the maximum profits are still challenging problems to the cloud service providers and cloud service users. It is important to provide the efficient scheduling. To schedule cloud resources, numerous heuristic algorithms such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Cuckoo Search (CS) algorithms have been adopted. The paper proposes a Modified Particle Swarm Optimization (MPSO) algorithm to solve the above mentioned issues. We first formulate an optimization problem and propose a Modified PSO optimization technique. The performance of MPSO was evaluated against PSO, and GA. Our experimental results show that the proposed MPSO minimizes the task execution time, and maximizes the resource utilization rate.


Journal ArticleDOI
TL;DR: In this article, the authors investigated the relationship between the significant control factors on acceptance intention to user experience (UX) sports smart wearable devices by applying Technology Readiness (TR) and Unified Theory of Technology (UTAUT).
Abstract: The main purpose of this research is to investigate relationships between the significant control factors on acceptance intention to User Experience (UX) sports smart wearable devices by applying Technology Readiness (TR) and Unified Theory of Technology (UTAUT). Research survey targeted on users of golf smart devices in Seoul. A total 534 questionnaires were collected and used for testing hypotheses. Methods to analyze the data included frequency analysis, reliability analysis, confirmatory factor analysis, correlation analysis, and structural equation modeling in accordance with the purpose of the study by using SPSS and AMOS. The results are as follows; First, positive TR had a significantly positive effect on social influence, effort expectancy, facilitating conditions, perceived enjoyment, performance expectancy. Second, negative TR had a significant negative effect on performance expectancy, social influence, facilitating conditions, perceived enjoyment. Third, TR had a no significantly effect on behavioral intention. Fourth, performance expectancy, perceived enjoyment and facilitating conditions had a significantly positive effect on behavioral intention. Fifth, behavioral intention had a significantly positive effect on use behavior. Thus it became crucial to identify the difference in acceptance intention models per each products are as follows. Positive TR of golf-related mobile application users has a positive effect on both technology acceptance belief and acceptance intention, whereas negative TR has no statistically significant effect on technology acceptance belief nor acceptance intention.

Journal Article
TL;DR: This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT and interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time.
Abstract: Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Journal ArticleDOI
TL;DR: Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue.
Abstract: In Underwater Linear Sensor Networks (UW-LSN) routing process, nodes without proper address make it difficult to determine relative sensor details specially the position of the node. In addition, it effects to determine the exact leakage position with minimized delay for long range underwater pipeline monitoring. Several studies have been made to overcome the mentioned issues. However, little attention has been given to minimize communication delay using dynamic addressing schemes. This paper presents the novel solution called Hop-by-Hop Dynamic Addressing based Routing Protocol for Pipeline Monitoring (H2-DARP-PM) to deal with nodes addressing and communication delay. H2-DARP-PM assigns a dynamic hop address to every participating node in an efficient manner. Dynamic addressing mechanism employed by H2-DARP-PM differentiates the heterogeneous types of sensor nodes thereby helping to control the traffic flows between the nodes. The proposed dynamic addressing mechanism provides support in the selection of an appropriate next hop neighbour. Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue. One of the distinguishing characteristics of H2-DARP-PM has the capability to operate with a fewer number of sensor nodes deployed for long-range underwater pipeline monitoring.

Journal Article
Bo Yin, Siwang Zhou, Shiwen Zhang, Ke Gu, Fei Yu 
TL;DR: In this paper, a data mapping scheme is proposed to estimate sensor readings and determine their dominance relationships without having to know the true values, and a new algorithm that avoids transmission of updates from nodes that cannot influence the reverse skyline is developed.
Abstract: The reverse skyline query plays an important role in information searching applications. This paper deals with continuous reverse skyline queries in sensor networks, which retrieves reverse skylines as well as the set of nodes that reported them for continuous sampling epochs. Designing an energy-efficient approach to answer continuous reverse skyline queries is non-trivial because the reverse skyline query is not decomposable and a huge number of unqualified nodes need to report their sensor readings. In this paper, we develop a new algorithm that avoids transmission of updates from nodes that cannot influence the reverse skyline. We propose a data mapping scheme to estimate sensor readings and determine their dominance relationships without having to know the true values. We also theoretically analyze the properties for reverse skyline computation, and propose efficient pruning techniques while guaranteeing the correctness of the answer. An extensive experimental evaluation demonstrates the efficiency of our approach.


Journal ArticleDOI
TL;DR: In this article, the authors proposed an improved DV-Hop localization algorithm based on the bat algorithm (IBDV-Hop) for WSNs, which incorporates optimization methods that enhance the accuracy of the average hop distance and fitness function.
Abstract: Obtaining accurate location information is important in practical applications of wireless sensor networks (WSNs). The distance vector hop (DV-Hop) is a frequently-used range-free localization algorithm in WSNs, but it has low localization accuracy. Moreover, despite various improvements to DV-Hop-based localization algorithms, maintaining a balance between high localization accuracy and good stability and convergence is still a challenge. To overcome these shortcomings, we proposed an improved DV-Hop localization algorithm based on the bat algorithm (IBDV-Hop) for WSNs. The IBDV-Hop algorithm incorporates optimization methods that enhance the accuracy of the average hop distance and fitness function. We also introduce a nonlinear dynamic inertial weight strategy to extend the global search scope and increase the local search accuracy. Moreover, we develop an updated solutions strategy that avoids premature convergence by the IBDV-Hop algorithm. Both theoretical analysis and simulation results show that the IBDV-Hop algorithm achieves higher localization accuracy than the original DV-Hop algorithm and other improved algorithms. The IBDV-Hop algorithm also exhibits good stability, search capability and convergence, and it requires little additional time complexity and energy consumption.


Journal Article
TL;DR: Wang et al. as mentioned in this paper proposed an efficient and secure auditing scheme based on identity-based cryptography, where a proxy is delegated to generate and upload homomorphic verifiable tags for user.
Abstract: Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users’ cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users’ data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user’s computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

Journal Article
TL;DR: In this paper, the authors present the standardization activities of IoMT focusing on explaining terms, standard scopes, and major media things with their use cases, one of the use cases is an IoT system for a blind pedestrian navigation assistance, is evaluated to prove its effectiveness.
Abstract: Recently, Internet of Things (IoT) drives a large variety of research, development, and new type of markets. All type of devices and sensors will be part of the Internet of Things and will be able to communicate not only plain data, but also audio-visual, olfactory, and haptic media data. In addition, as the devices and sensors getting smarter, it is highly probable that they can process acquired media and metadata to extract higher level of information (e.g., semantics). To support such enhanced functionalities, ISO/IEC SC29 WG11 (MPEG) starts a new standard project, ISO/IEC 23093, called Internet of Media Things (IoMT) to provide standard data formats and APIs for media things. This paper presents the standardization activities of IoMT focusing on explaining terms, standard scopes, and major media things with their use cases. One of the use cases, an IoT system for a blind pedestrian navigation assistance, is evaluated to prove its effectiveness.